• Title/Summary/Keyword: 융합인증

Search Result 609, Processing Time 0.019 seconds

Development of wearable device with smart key function and convergence of personal bio-certification and technology using ECG signal (심전도 신호를 이용한 개인 바이오인증 기술 융합과 smart key 기능이 탑재된 wearable device 개발)

  • Bang, Gul-Won
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.637-642
    • /
    • 2022
  • Self-authentication technology using electrocardiogram (ECG) signals is drawing attention as a self-authentication technology that can replace existing bio-authentication. A device that recognizes a digital electronic key can be mounted on a vehicle to wirelessly exchange data with a car, and a function that can lock or unlock a car door or start a car by using a smartphone can be controlled through a smartphone. However, smart keys are vulnerable to security, so smart keys applied with bio-authentication technology were studied to solve this problem and provide driver convenience. A personal authentication algorithm using electrocardiogram was mounted on a watch-type wearable device to authenticate bio, and when personal authentication was completed, it could function as a smart key of a car. The certification rate was 95 per cent achieved. Drivers do not need to have a smart key, and they propose a smart key as an alternative that can safely protect it from loss and hacking. Smart keys using personal authentication technology using electrocardiogram can be applied to various fields through personal authentication and will study methods that can be applied to identification devices using electrocardiogram in the future.

Analysis of VANET Authentication Protocol using Casper in the Formal Verification (정형검증 도구인 Casper를 이용한 VANET 인증 프로토콜 분석)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehiculars sho uld be able to authenticate each other to securely communicate with network-based infrastructure, and their location s and identifiers should not be exposed from the communication messages. This paper explains V2I authentication pr otocol using a hash function that preserves the user privacy. In addition, we analyze the security stability of the V2I authentication protocol using Casper in the formal verification technique. As a result, V2I authentication protocol us ing hash function prove a stability.

APSI : A user Authentication Protocol using Smart phone in Immobilizer System (이모빌라이저 시스템에서 스마트폰을 이용한 인증 프로토콜)

  • Shin, Miyea;Jeong, Yoonsu;Bae, Woosik;Lee, Sangho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.1
    • /
    • pp.41-45
    • /
    • 2014
  • Only if the secret key stored in the engine ECU matches car key stored in the car, immobilizer system is a car anti-theft system that automobile engine takes. To take an action as soon in case of losing car key or being stolen, the ASPI protocol is proposed for assigning a new password after finishing user authentication by the smart phone etc. The shortcoming point of that directly bring the car to a service center in case of losing key can be complemented by the proposed protocol. In case of the car and key both are theft together, the car can be stopped soon.

  • PDF

An Investigation on Survivable Security Schemes of Home Service Gateway (홈서비스 게이트웨이 보안 체계에 관한 연구)

  • Kim, Hyun Cheol;Kim, Si Hung;An, Seongjin;Jung, Jin Wook;Ryu, Yoon Sik;Jun, Young Il
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.25-33
    • /
    • 2003
  • With the radical improvement of wire and wireless communication technologies, home network which interconnects various home appliances is approaching ripening stage. Digitalization of the home environment will break down the boundaries of information, communications and broadcasting, and enable us to realize many breakthroughs on the home front and connect to our home. In order to enable users to access securely to their home network, we first construct secure home network model which can authorize users using their permission policy. In this paper, we examine various security technique used in home network and propose home network security scheme which can service constantly.

  • PDF

A Study on Industrial Security Outflow Prevention System Based on Network Biometric Authentication (네트워크 바이오 인증 기반 산업기술 유출방지 시스템에 관한 연구)

  • Lee, Dae-Sung
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.31-36
    • /
    • 2011
  • Enterprise which has a core technology or organization which manages a core information will be walking into a critical situation like a ruins when organization's confidential information is outflowed. In the past confidential information that was leaked to the off-line, recently the outflow made possible through a variety of equipment at any time via the network based on the ubiquitous communication environment. In this paper, we propose to authenticate and block all packets transmitted via the network at real-time in order to prevent confidentials outflow. Especially in or der to differentiate between users who attempt to disclose confidentials, we propose to insert user's biometric informaion transparently at per-packet basis, and also verify a performance by simulation.

Trustworthy authentication and key management for NSDR ad-hoc network (안정적인 동적 복합 ad-hoc 네트워크와 이에 대한 신뢰성 있는 키 인증과 키 관리)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.49-55
    • /
    • 2012
  • In this paper, we consider the limit of the previous works for ad-hoc network, then propose a dynamic routing scheme which employs a 2-tier hierarchical structure. We adopt the advantages of proactive and reactive routing scheme for efficient network management. We define this method as NSDR(New Secure Dynamic Routing) scheme. We also propose a trustworthy authentication and key management for the proposed ad-hoc network. We currently study the possibility that ad-hoc networks can provide a service such as key management and authentication for the next generation mobile network.

V2I Authentication Protocol using Error Correcting Code in VANET Environment (VANET 환경에서 오류수정부호를 사용한 V2I 인증 프로토콜)

  • Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.37-44
    • /
    • 2011
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many field. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehicles shoul d be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. This paper proposes V2I(Vehicular to Infra structure) authentication protocol that anonymity and untraceability of vehicular using Error Correcting Code that ge nerate encoding certification using generation matrix. The proposed scheme based on ECC resolves overhead problems of vehicular secure key management of KDC.

The design of Biometrics System to enhance the security through the Distributed Stored of Multiple Split bio_Templates (생체정보 다분할 분산저장 기법을 통한 보안성 향상의 생체인증 시스템 설계)

  • Hong, Yoon Kee;Yoon, Ji Won
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.31-39
    • /
    • 2016
  • The biometrics information is very useful by the convenience of ownership and using. but the risk of crime of malicious re-uses and infringement of personal privacy exist because the biometrics information is impossible to change typically when the illegal interception occurred from others. therefore the importance of security on stored management of biometrics information has been increased steadily. the existing biometric authentication system has been stored only encrypted complete template at a single storage place. In this paper, we designed the Distributed Stored of Multiple Split bio_Template System that a template is divided in different ways by each user and stored in other storage places from personal information to relieve user's anxiety about the saved template and illegally leaked through restored only template to authenticate and then delete.

A Book Retrieval System to Secure Authentication and Responsibility on Social Network Service Environments (소셜 네트워크 서비스 환경에서 안전한 사용자 인증과 효과적인 응답성을 제공할 수 있는 도서 검색시스템)

  • Moon, Wonsuk;Kim, Seoksoo;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.33-40
    • /
    • 2014
  • Since 2006, social networking services such as Facebook, Twitter, and Blog user increasing very rapidly. Furthermore demand of Book Retrieval Service using smartphone on social network service environment are increasing too. This service can to easy and share information for search book and data in several university. However, the current edition of the social services in the country to provide security services do not have the right. Therefore, we suggest a social book Retrieval service in social network environment that can support user authentication and partial filter search method on smartphone. our proposed system can to provide more speed responsiveness, effective display result on smartphone and security service.

A User Authentication Technique for the E-commerce (전자상거래를 위한 사용자 인증 기술)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.29-36
    • /
    • 2005
  • The industrial structure of the Internet is changing from off-line to on-line. E-commerce on the Internet will be formed a big market by developing of network. E-commerce on the Internet is natural. And it will be increase in interest of many people. By the way, it must support to institutional and technical problem. First of all, we need user authentication technique. In this paper, we described about safe Electronic shopping mall construction and operation by three main categories. First is security solution method of E-commerce, Second is analyzing about various threats and vulnerability when is user authentication in Electronic shopping mall. Third is to propose countermeasures of that.

  • PDF